title
stringlengths 7
246
| abstract
stringlengths 6
3.31k
|
---|---|
How is a data-driven approach better than random choice in label space
division for multi-label classification? | We propose using five data-driven community detection approaches from social
networks to partition the label space for the task of multi-label
classification as an alternative to random partitioning into equal subsets as
performed by RAkELd: modularity-maximizing fastgreedy and leading eigenvector,
infomap, walktrap and label propagation algorithms. We construct a label
co-occurence graph (both weighted an unweighted versions) based on training
data and perform community detection to partition the label set. We include
Binary Relevance and Label Powerset classification methods for comparison. We
use gini-index based Decision Trees as the base classifier. We compare educated
approaches to label space divisions against random baselines on 12 benchmark
data sets over five evaluation measures. We show that in almost all cases seven
educated guess approaches are more likely to outperform RAkELd than otherwise
in all measures, but Hamming Loss. We show that fastgreedy and walktrap
community detection methods on weighted label co-occurence graphs are 85-92%
more likely to yield better F1 scores than random partitioning. Infomap on the
unweighted label co-occurence graphs is on average 90% of the times better than
random paritioning in terms of Subset Accuracy and 89% when it comes to Jaccard
similarity. Weighted fastgreedy is better on average than RAkELd when it comes
to Hamming Loss.
|
Active Long Term Memory Networks | Continual Learning in artificial neural networks suffers from interference
and forgetting when different tasks are learned sequentially. This paper
introduces the Active Long Term Memory Networks (A-LTM), a model of sequential
multi-task deep learning that is able to maintain previously learned
association between sensory input and behavioral output while acquiring knew
knowledge. A-LTM exploits the non-convex nature of deep neural networks and
actively maintains knowledge of previously learned, inactive tasks using a
distillation loss. Distortions of the learned input-output map are penalized
but hidden layers are free to transverse towards new local optima that are more
favorable for the multi-task objective. We re-frame the McClelland's seminal
Hippocampal theory with respect to Catastrophic Inference (CI) behavior
exhibited by modern deep architectures trained with back-propagation and
inhomogeneous sampling of latent factors across epochs. We present empirical
results of non-trivial CI during continual learning in Deep Linear Networks
trained on the same task, in Convolutional Neural Networks when the task shifts
from predicting semantic to graphical factors and during domain adaptation from
simple to complex environments. We present results of the A-LTM model's ability
to maintain viewpoint recognition learned in the highly controlled iLab-20M
dataset with 10 object categories and 88 camera viewpoints, while adapting to
the unstructured domain of Imagenet with 1,000 object categories.
|
SE3-Nets: Learning Rigid Body Motion using Deep Neural Networks | We introduce SE3-Nets, which are deep neural networks designed to model and
learn rigid body motion from raw point cloud data. Based only on sequences of
depth images along with action vectors and point wise data associations,
SE3-Nets learn to segment effected object parts and predict their motion
resulting from the applied force. Rather than learning point wise flow vectors,
SE3-Nets predict SE3 transformations for different parts of the scene. Using
simulated depth data of a table top scene and a robot manipulator, we show that
the structure underlying SE3-Nets enables them to generate a far more
consistent prediction of object motion than traditional flow based networks.
Additional experiments with a depth camera observing a Baxter robot pushing
objects on a table show that SE3-Nets also work well on real data.
|
Deep Successor Reinforcement Learning | Learning robust value functions given raw observations and rewards is now
possible with model-free and model-based deep reinforcement learning
algorithms. There is a third alternative, called Successor Representations
(SR), which decomposes the value function into two components -- a reward
predictor and a successor map. The successor map represents the expected future
state occupancy from any given state and the reward predictor maps states to
scalar rewards. The value function of a state can be computed as the inner
product between the successor map and the reward weights. In this paper, we
present DSR, which generalizes SR within an end-to-end deep reinforcement
learning framework. DSR has several appealing properties including: increased
sensitivity to distal reward changes due to factorization of reward and world
dynamics, and the ability to extract bottleneck states (subgoals) given
successor maps trained under a random policy. We show the efficacy of our
approach on two diverse environments given raw pixel observations -- simple
grid-world domains (MazeBase) and the Doom game engine.
|
Clustering with Same-Cluster Queries | We propose a framework for Semi-Supervised Active Clustering framework
(SSAC), where the learner is allowed to interact with a domain expert, asking
whether two given instances belong to the same cluster or not. We study the
query and computational complexity of clustering in this framework. We consider
a setting where the expert conforms to a center-based clustering with a notion
of margin. We show that there is a trade off between computational complexity
and query complexity; We prove that for the case of $k$-means clustering (i.e.,
when the expert conforms to a solution of $k$-means), having access to
relatively few such queries allows efficient solutions to otherwise NP hard
problems.
In particular, we provide a probabilistic polynomial-time (BPP) algorithm for
clustering in this setting that asks $O\big(k^2\log k + k\log n)$ same-cluster
queries and runs with time complexity $O\big(kn\log n)$ (where $k$ is the
number of clusters and $n$ is the number of instances). The algorithm succeeds
with high probability for data satisfying margin conditions under which,
without queries, we show that the problem is NP hard. We also prove a lower
bound on the number of queries needed to have a computationally efficient
clustering algorithm in this setting.
|
Structured Convolution Matrices for Energy-efficient Deep learning | We derive a relationship between network representation in energy-efficient
neuromorphic architectures and block Toplitz convolutional matrices. Inspired
by this connection, we develop deep convolutional networks using a family of
structured convolutional matrices and achieve state-of-the-art trade-off
between energy efficiency and classification accuracy for well-known image
recognition tasks. We also put forward a novel method to train binary
convolutional networks by utilising an existing connection between
noisy-rectified linear units and binary activations.
|
Gossip Dual Averaging for Decentralized Optimization of Pairwise
Functions | In decentralized networks (of sensors, connected objects, etc.), there is an
important need for efficient algorithms to optimize a global cost function, for
instance to learn a global model from the local data collected by each
computing unit. In this paper, we address the problem of decentralized
minimization of pairwise functions of the data points, where these points are
distributed over the nodes of a graph defining the communication topology of
the network. This general problem finds applications in ranking, distance
metric learning and graph inference, among others. We propose new gossip
algorithms based on dual averaging which aims at solving such problems both in
synchronous and asynchronous settings. The proposed framework is flexible
enough to deal with constrained and regularized variants of the optimization
problem. Our theoretical analysis reveals that the proposed algorithms preserve
the convergence rate of centralized dual averaging up to an additive bias term.
We present numerical simulations on Area Under the ROC Curve (AUC) maximization
and metric learning problems which illustrate the practical interest of our
approach.
|
Multiple-Play Bandits in the Position-Based Model | Sequentially learning to place items in multi-position displays or lists is a
task that can be cast into the multiple-play semi-bandit setting. However, a
major concern in this context is when the system cannot decide whether the user
feedback for each item is actually exploitable. Indeed, much of the content may
have been simply ignored by the user. The present work proposes to exploit
available information regarding the display position bias under the so-called
Position-based click model (PBM). We first discuss how this model differs from
the Cascade model and its variants considered in several recent works on
multiple-play bandits. We then provide a novel regret lower bound for this
model as well as computationally efficient algorithms that display good
empirical and theoretical performance.
|
Convolutional Neural Fabrics | Despite the success of CNNs, selecting the optimal architecture for a given
task remains an open problem. Instead of aiming to select a single optimal
architecture, we propose a "fabric" that embeds an exponentially large number
of architectures. The fabric consists of a 3D trellis that connects response
maps at different layers, scales, and channels with a sparse homogeneous local
connectivity pattern. The only hyper-parameters of a fabric are the number of
channels and layers. While individual architectures can be recovered as paths,
the fabric can in addition ensemble all embedded architectures together,
sharing their weights where their paths overlap. Parameters can be learned
using standard methods based on back-propagation, at a cost that scales
linearly in the fabric size. We present benchmark results competitive with the
state of the art for image classification on MNIST and CIFAR10, and for
semantic segmentation on the Part Labels dataset.
|
Improving Recurrent Neural Networks For Sequence Labelling | In this paper we study different types of Recurrent Neural Networks (RNN) for
sequence labeling tasks. We propose two new variants of RNNs integrating
improvements for sequence labeling, and we compare them to the more traditional
Elman and Jordan RNNs. We compare all models, either traditional or new, on
four distinct tasks of sequence labeling: two on Spoken Language Understanding
(ATIS and MEDIA); and two of POS tagging for the French Treebank (FTB) and the
Penn Treebank (PTB) corpora. The results show that our new variants of RNNs are
always more effective than the others.
|
Towards End-to-End Learning for Dialog State Tracking and Management
using Deep Reinforcement Learning | This paper presents an end-to-end framework for task-oriented dialog systems
using a variant of Deep Recurrent Q-Networks (DRQN). The model is able to
interface with a relational database and jointly learn policies for both
language understanding and dialog strategy. Moreover, we propose a hybrid
algorithm that combines the strength of reinforcement learning and supervised
learning to achieve faster learning speed. We evaluated the proposed model on a
20 Question Game conversational game simulator. Results show that the proposed
method outperforms the modular-based baseline and learns a distributed
representation of the latent dialog state.
|
Convolution by Evolution: Differentiable Pattern Producing Networks | In this work we introduce a differentiable version of the Compositional
Pattern Producing Network, called the DPPN. Unlike a standard CPPN, the
topology of a DPPN is evolved but the weights are learned. A Lamarckian
algorithm, that combines evolution and learning, produces DPPNs to reconstruct
an image. Our main result is that DPPNs can be evolved/trained to compress the
weights of a denoising autoencoder from 157684 to roughly 200 parameters, while
achieving a reconstruction accuracy comparable to a fully connected network
with more than two orders of magnitude more parameters. The regularization
ability of the DPPN allows it to rediscover (approximate) convolutional network
architectures embedded within a fully connected architecture. Such
convolutional architectures are the current state of the art for many computer
vision applications, so it is satisfying that DPPNs are capable of discovering
this structure rather than having to build it in by design. DPPNs exhibit
better generalization when tested on the Omniglot dataset after being trained
on MNIST, than directly encoded fully connected autoencoders. DPPNs are
therefore a new framework for integrating learning and evolution.
|
Fast and Extensible Online Multivariate Kernel Density Estimation | We present xokde++, a state-of-the-art online kernel density estimation
approach that maintains Gaussian mixture models input data streams. The
approach follows state-of-the-art work on online density estimation, but was
redesigned with computational efficiency, numerical robustness, and
extensibility in mind. Our approach produces comparable or better results than
the current state-of-the-art, while achieving significant computational
performance gains and improved numerical stability. The use of diagonal
covariance Gaussian kernels, which further improve performance and stability,
at a small loss of modelling quality, is also explored. Our approach is up to
40 times faster, while requiring 90\% less memory than the closest
state-of-the-art counterpart.
|
Specific Differential Entropy Rate Estimation for Continuous-Valued Time
Series | We introduce a method for quantifying the inherent unpredictability of a
continuous-valued time series via an extension of the differential Shannon
entropy rate. Our extension, the specific entropy rate, quantifies the amount
of predictive uncertainty associated with a specific state, rather than
averaged over all states. We relate the specific entropy rate to popular
`complexity' measures such as Approximate and Sample Entropies. We provide a
data-driven approach for estimating the specific entropy rate of an observed
time series. Finally, we consider three case studies of estimating specific
entropy rate from synthetic and physiological data relevant to the analysis of
heart rate variability.
|
Efficient Estimation of k for the Nearest Neighbors Class of Methods | The k Nearest Neighbors (kNN) method has received much attention in the past
decades, where some theoretical bounds on its performance were identified and
where practical optimizations were proposed for making it work fairly well in
high dimensional spaces and on large datasets. From countless experiments of
the past it became widely accepted that the value of k has a significant impact
on the performance of this method. However, the efficient optimization of this
parameter has not received so much attention in literature. Today, the most
common approach is to cross-validate or bootstrap this value for all values in
question. This approach forces distances to be recomputed many times, even if
efficient methods are used. Hence, estimating the optimal k can become
expensive even on modern systems. Frequently, this circumstance leads to a
sparse manual search of k. In this paper we want to point out that a systematic
and thorough estimation of the parameter k can be performed efficiently. The
discussed approach relies on large matrices, but we want to argue, that in
practice a higher space complexity is often much less of a problem than
repetitive distance computations.
|
Safe and Efficient Off-Policy Reinforcement Learning | In this work, we take a fresh look at some old and new algorithms for
off-policy, return-based reinforcement learning. Expressing these in a common
form, we derive a novel algorithm, Retrace($\lambda$), with three desired
properties: (1) it has low variance; (2) it safely uses samples collected from
any behaviour policy, whatever its degree of "off-policyness"; and (3) it is
efficient as it makes the best use of samples collected from near on-policy
behaviour policies. We analyze the contractive nature of the related operator
under both off-policy policy evaluation and control settings and derive online
sample-based algorithms. We believe this is the first return-based off-policy
control algorithm converging a.s. to $Q^*$ without the GLIE assumption (Greedy
in the Limit with Infinite Exploration). As a corollary, we prove the
convergence of Watkins' Q($\lambda$), which was an open problem since 1989. We
illustrate the benefits of Retrace($\lambda$) on a standard suite of Atari 2600
games.
|
Learning Power Spectrum Maps from Quantized Power Measurements | Power spectral density (PSD) maps providing the distribution of RF power
across space and frequency are constructed using power measurements collected
by a network of low-cost sensors. By introducing linear compression and
quantization to a small number of bits, sensor measurements can be communicated
to the fusion center with minimal bandwidth requirements. Strengths of data-
and model-driven approaches are combined to develop estimators capable of
incorporating multiple forms of spectral and propagation prior information
while fitting the rapid variations of shadow fading across space. To this end,
novel nonparametric and semiparametric formulations are investigated. It is
shown that PSD maps can be obtained using support vector machine-type solvers.
In addition to batch approaches, an online algorithm attuned to real-time
operation is developed. Numerical tests assess the performance of the novel
algorithms.
|
Continuously Learning Neural Dialogue Management | We describe a two-step approach for dialogue management in task-oriented
spoken dialogue systems. A unified neural network framework is proposed to
enable the system to first learn by supervision from a set of dialogue data and
then continuously improve its behaviour via reinforcement learning, all using
gradient-based algorithms on one single model. The experiments demonstrate the
supervised model's effectiveness in the corpus-based evaluation, with user
simulation, and with paid human subjects. The use of reinforcement learning
further improves the model's performance in both interactive settings,
especially under higher-noise conditions.
|
Efficient Smoothed Concomitant Lasso Estimation for High Dimensional
Regression | In high dimensional settings, sparse structures are crucial for efficiency,
both in term of memory, computation and performance. It is customary to
consider $\ell_1$ penalty to enforce sparsity in such scenarios. Sparsity
enforcing methods, the Lasso being a canonical example, are popular candidates
to address high dimension. For efficiency, they rely on tuning a parameter
trading data fitting versus sparsity. For the Lasso theory to hold this tuning
parameter should be proportional to the noise level, yet the latter is often
unknown in practice. A possible remedy is to jointly optimize over the
regression parameter as well as over the noise level. This has been considered
under several names in the literature: Scaled-Lasso, Square-root Lasso,
Concomitant Lasso estimation for instance, and could be of interest for
confidence sets or uncertainty quantification. In this work, after illustrating
numerical difficulties for the Smoothed Concomitant Lasso formulation, we
propose a modification we coined Smoothed Concomitant Lasso, aimed at
increasing numerical stability. We propose an efficient and accurate solver
leading to a computational cost no more expansive than the one for the Lasso.
We leverage on standard ingredients behind the success of fast Lasso solvers: a
coordinate descent algorithm, combined with safe screening rules to achieve
speed efficiency, by eliminating early irrelevant features.
|
Learning Thermodynamics with Boltzmann Machines | A Boltzmann machine is a stochastic neural network that has been extensively
used in the layers of deep architectures for modern machine learning
applications. In this paper, we develop a Boltzmann machine that is capable of
modelling thermodynamic observables for physical systems in thermal
equilibrium. Through unsupervised learning, we train the Boltzmann machine on
data sets constructed with spin configurations importance-sampled from the
partition function of an Ising Hamiltonian at different temperatures using
Monte Carlo (MC) methods. The trained Boltzmann machine is then used to
generate spin states, for which we compare thermodynamic observables to those
computed by direct MC sampling. We demonstrate that the Boltzmann machine can
faithfully reproduce the observables of the physical system. Further, we
observe that the number of neurons required to obtain accurate results
increases as the system is brought close to criticality.
|
Variational Information Maximization for Feature Selection | Feature selection is one of the most fundamental problems in machine
learning. An extensive body of work on information-theoretic feature selection
exists which is based on maximizing mutual information between subsets of
features and class labels. Practical methods are forced to rely on
approximations due to the difficulty of estimating mutual information. We
demonstrate that approximations made by existing methods are based on
unrealistic assumptions. We formulate a more flexible and general class of
assumptions based on variational distributions and use them to tractably
generate lower bounds for mutual information. These bounds define a novel
information-theoretic framework for feature selection, which we prove to be
optimal under tree graphical models with proper choice of variational
distributions. Our experiments demonstrate that the proposed method strongly
outperforms existing information-theoretic feature selection approaches.
|
Sketching for Large-Scale Learning of Mixture Models | Learning parameters from voluminous data can be prohibitive in terms of
memory and computational requirements. We propose a "compressive learning"
framework where we estimate model parameters from a sketch of the training
data. This sketch is a collection of generalized moments of the underlying
probability distribution of the data. It can be computed in a single pass on
the training set, and is easily computable on streams or distributed datasets.
The proposed framework shares similarities with compressive sensing, which aims
at drastically reducing the dimension of high-dimensional signals while
preserving the ability to reconstruct them. To perform the estimation task, we
derive an iterative algorithm analogous to sparse reconstruction algorithms in
the context of linear inverse problems. We exemplify our framework with the
compressive estimation of a Gaussian Mixture Model (GMM), providing heuristics
on the choice of the sketching procedure and theoretical guarantees of
reconstruction. We experimentally show on synthetic data that the proposed
algorithm yields results comparable to the classical Expectation-Maximization
(EM) technique while requiring significantly less memory and fewer computations
when the number of database elements is large. We further demonstrate the
potential of the approach on real large-scale data (over 10 8 training samples)
for the task of model-based speaker verification. Finally, we draw some
connections between the proposed framework and approximate Hilbert space
embedding of probability distributions using random features. We show that the
proposed sketching operator can be seen as an innovative method to design
translation-invariant kernels adapted to the analysis of GMMs. We also use this
theoretical framework to derive information preservation guarantees, in the
spirit of infinite-dimensional compressive sensing.
|
e-Commerce product classification: our participation at cDiscount 2015
challenge | This report describes our participation in the cDiscount 2015 challenge where
the goal was to classify product items in a predefined taxonomy of products.
Our best submission yielded an accuracy score of 64.20\% in the private part of
the leaderboard and we were ranked 10th out of 175 participating teams. We
followed a text classification approach employing mainly linear models. The
final solution was a weighted voting system which combined a variety of trained
models.
|
Sequence-to-Sequence Learning as Beam-Search Optimization | Sequence-to-Sequence (seq2seq) modeling has rapidly become an important
general-purpose NLP tool that has proven effective for many text-generation and
sequence-labeling tasks. Seq2seq builds on deep neural language modeling and
inherits its remarkable accuracy in estimating local, next-word distributions.
In this work, we introduce a model and beam-search training scheme, based on
the work of Daume III and Marcu (2005), that extends seq2seq to learn global
sequence scores. This structured approach avoids classical biases associated
with local training and unifies the training loss with the test-time usage,
while preserving the proven model architecture of seq2seq and its efficient
training approach. We show that our system outperforms a highly-optimized
attention-based seq2seq system and other baselines on three different sequence
to sequence tasks: word ordering, parsing, and machine translation.
|
Generative Topic Embedding: a Continuous Representation of Documents
(Extended Version with Proofs) | Word embedding maps words into a low-dimensional continuous embedding space
by exploiting the local word collocation patterns in a small context window. On
the other hand, topic modeling maps documents onto a low-dimensional topic
space, by utilizing the global word collocation patterns in the same document.
These two types of patterns are complementary. In this paper, we propose a
generative topic embedding model to combine the two types of patterns. In our
model, topics are represented by embedding vectors, and are shared across
documents. The probability of each word is influenced by both its local context
and its topic. A variational inference method yields the topic embeddings as
well as the topic mixing proportions for each document. Jointly they represent
the document in a low-dimensional continuous space. In two document
classification tasks, our method performs better than eight existing methods,
with fewer features. In addition, we illustrate with an example that our method
can generate coherent topics even based on only one document.
|
On Projected Stochastic Gradient Descent Algorithm with Weighted
Averaging for Least Squares Regression | The problem of least squares regression of a $d$-dimensional unknown
parameter is considered. A stochastic gradient descent based algorithm with
weighted iterate-averaging that uses a single pass over the data is studied and
its convergence rate is analyzed. We first consider a bounded constraint set of
the unknown parameter. Under some standard regularity assumptions, we provide
an explicit $O(1/k)$ upper bound on the convergence rate, depending on the
variance (due to the additive noise in the measurements) and the size of the
constraint set. We show that the variance term dominates the error and
decreases with rate $1/k$, while the term which is related to the size of the
constraint set decreases with rate $\log k/k^2$. We then compare the asymptotic
ratio $\rho$ between the convergence rate of the proposed scheme and the
empirical risk minimizer (ERM) as the number of iterations approaches infinity.
We show that $\rho\leq 4$ under some mild conditions for all $d\geq 1$. We
further improve the upper bound by showing that $\rho\leq 4/3$ for the case of
$d=1$ and unbounded parameter set. Simulation results demonstrate strong
performance of the algorithm as compared to existing methods, and coincide with
$\rho\leq 4/3$ even for large $d$ in practice.
|
Efficient Robust Proper Learning of Log-concave Distributions | We study the {\em robust proper learning} of univariate log-concave
distributions (over continuous and discrete domains). Given a set of samples
drawn from an unknown target distribution, we want to compute a log-concave
hypothesis distribution that is as close as possible to the target, in total
variation distance. In this work, we give the first computationally efficient
algorithm for this learning problem. Our algorithm achieves the
information-theoretically optimal sample size (up to a constant factor), runs
in polynomial time, and is robust to model misspecification with nearly-optimal
error guarantees.
Specifically, we give an algorithm that, on input $n=O(1/\eps^{5/2})$ samples
from an unknown distribution $f$, runs in time $\widetilde{O}(n^{8/5})$, and
outputs a log-concave hypothesis $h$ that (with high probability) satisfies
$\dtv(h, f) = O(\opt)+\eps$, where $\opt$ is the minimum total variation
distance between $f$ and the class of log-concave distributions. Our approach
to the robust proper learning problem is quite flexible and may be applicable
to many other univariate distribution families.
|
Mutual Exclusivity Loss for Semi-Supervised Deep Learning | In this paper we consider the problem of semi-supervised learning with deep
Convolutional Neural Networks (ConvNets). Semi-supervised learning is motivated
on the observation that unlabeled data is cheap and can be used to improve the
accuracy of classifiers. In this paper we propose an unsupervised
regularization term that explicitly forces the classifier's prediction for
multiple classes to be mutually-exclusive and effectively guides the decision
boundary to lie on the low density space between the manifolds corresponding to
different classes of data. Our proposed approach is general and can be used
with any backpropagation-based learning method. We show through different
experiments that our method can improve the object recognition performance of
ConvNets using unlabeled data.
|
Sentence Similarity Measures for Fine-Grained Estimation of Topical
Relevance in Learner Essays | We investigate the task of assessing sentence-level prompt relevance in
learner essays. Various systems using word overlap, neural embeddings and
neural compositional models are evaluated on two datasets of learner writing.
We propose a new method for sentence-level similarity calculation, which learns
to adjust the weights of pre-trained word embeddings for a specific task,
achieving substantially higher accuracy compared to other relevant baselines.
|
Unsupervised Learning of Word-Sequence Representations from Scratch via
Convolutional Tensor Decomposition | Unsupervised text embeddings extraction is crucial for text understanding in
machine learning. Word2Vec and its variants have received substantial success
in mapping words with similar syntactic or semantic meaning to vectors close to
each other. However, extracting context-aware word-sequence embedding remains a
challenging task. Training over large corpus is difficult as labels are
difficult to get. More importantly, it is challenging for pre-trained models to
obtain word-sequence embeddings that are universally good for all downstream
tasks or for any new datasets. We propose a two-phased ConvDic+DeconvDec
framework to solve the problem by combining a word-sequence dictionary learning
model with a word-sequence embedding decode model. We propose a convolutional
tensor decomposition mechanism to learn good word-sequence phrase dictionary in
the learning phase. It is proved to be more accurate and much more efficient
than the popular alternating minimization method. In the decode phase, we
introduce a deconvolution framework that is immune to the problem of varying
sentence lengths. The word-sequence embeddings we extracted using
ConvDic+DeconvDec are universally good for a few downstream tasks we test on.
The framework requires neither pre-training nor prior/outside information.
|
Finding Low-Rank Solutions via Non-Convex Matrix Factorization,
Efficiently and Provably | A rank-$r$ matrix $X \in \mathbb{R}^{m \times n}$ can be written as a product
$U V^\top$, where $U \in \mathbb{R}^{m \times r}$ and $V \in \mathbb{R}^{n
\times r}$. One could exploit this observation in optimization: e.g., consider
the minimization of a convex function $f(X)$ over rank-$r$ matrices, where the
set of rank-$r$ matrices is modeled via the factorization $UV^\top$. Though
such parameterization reduces the number of variables, and is more
computationally efficient (of particular interest is the case $r \ll \min\{m,
n\}$), it comes at a cost: $f(UV^\top)$ becomes a non-convex function w.r.t.
$U$ and $V$.
We study such parameterization for optimization of generic convex objectives
$f$, and focus on first-order, gradient descent algorithmic solutions. We
propose the Bi-Factored Gradient Descent (BFGD) algorithm, an efficient
first-order method that operates on the $U, V$ factors. We show that when $f$
is (restricted) smooth, BFGD has local sublinear convergence, and linear
convergence when $f$ is both (restricted) smooth and (restricted) strongly
convex. For several key applications, we provide simple and efficient
initialization schemes that provide approximate solutions good enough for the
above convergence results to hold.
|
Phase Retrieval via Incremental Truncated Wirtinger Flow | In the phase retrieval problem, an unknown vector is to be recovered given
quadratic measurements. This problem has received considerable attention in
recent times. In this paper, we present an algorithm to solve a nonconvex
formulation of the phase retrieval problem, that we call $\textit{Incremental
Truncated Wirtinger Flow}$. Given random Gaussian sensing vectors, we prove
that it converges linearly to the solution, with an optimal sample complexity.
We also provide stability guarantees of the algorithm under noisy measurements.
Performance and comparisons with existing algorithms are illustrated via
numerical experiments on simulated and real data, with both random and
structured sensing vectors.
|
Causal Bandits: Learning Good Interventions via Causal Inference | We study the problem of using causal models to improve the rate at which good
interventions can be learned online in a stochastic environment. Our formalism
combines multi-arm bandits and causal inference to model a novel type of bandit
feedback that is not exploited by existing approaches. We propose a new
algorithm that exploits the causal feedback and prove a bound on its simple
regret that is strictly better (in all quantities) than algorithms that do not
use the additional causal information.
|
Deep CNNs along the Time Axis with Intermap Pooling for Robustness to
Spectral Variations | Convolutional neural networks (CNNs) with convolutional and pooling
operations along the frequency axis have been proposed to attain invariance to
frequency shifts of features. However, this is inappropriate with regard to the
fact that acoustic features vary in frequency. In this paper, we contend that
convolution along the time axis is more effective. We also propose the addition
of an intermap pooling (IMP) layer to deep CNNs. In this layer, filters in each
group extract common but spectrally variant features, then the layer pools the
feature maps of each group. As a result, the proposed IMP CNN can achieve
insensitivity to spectral variations characteristic of different speakers and
utterances. The effectiveness of the IMP CNN architecture is demonstrated on
several LVCSR tasks. Even without speaker adaptation techniques, the
architecture achieved a WER of 12.7% on the SWB part of the Hub5'2000
evaluation test set, which is competitive with other state-of-the-art methods.
|
Discovery of Latent Factors in High-dimensional Data Using Tensor
Methods | Unsupervised learning aims at the discovery of hidden structure that drives
the observations in the real world. It is essential for success in modern
machine learning. Latent variable models are versatile in unsupervised learning
and have applications in almost every domain. Training latent variable models
is challenging due to the non-convexity of the likelihood objective. An
alternative method is based on the spectral decomposition of low order moment
tensors. This versatile framework is guaranteed to estimate the correct model
consistently. My thesis spans both theoretical analysis of tensor decomposition
framework and practical implementation of various applications. This thesis
presents theoretical results on convergence to globally optimal solution of
tensor decomposition using the stochastic gradient descent, despite
non-convexity of the objective. This is the first work that gives global
convergence guarantees for the stochastic gradient descent on non-convex
functions with exponentially many local minima and saddle points. This thesis
also presents large-scale deployment of spectral methods carried out on various
platforms. Dimensionality reduction techniques such as random projection are
incorporated for a highly parallel and scalable tensor decomposition algorithm.
We obtain a gain in both accuracies and in running times by several orders of
magnitude compared to the state-of-art variational methods. To solve real world
problems, more advanced models and learning algorithms are proposed. This
thesis discusses generalization of LDA model to mixed membership stochastic
block model for learning user communities in social network, convolutional
dictionary model for learning word-sequence embeddings, hierarchical tensor
decomposition and latent tree structure model for learning disease hierarchy,
and spatial point process mixture model for detecting cell types in
neuroscience.
|
IDNet: Smartphone-based Gait Recognition with Convolutional Neural
Networks | Here, we present IDNet, a user authentication framework from
smartphone-acquired motion signals. Its goal is to recognize a target user from
their way of walking, using the accelerometer and gyroscope (inertial) signals
provided by a commercial smartphone worn in the front pocket of the user's
trousers. IDNet features several innovations including: i) a robust and
smartphone-orientation-independent walking cycle extraction block, ii) a novel
feature extractor based on convolutional neural networks, iii) a one-class
support vector machine to classify walking cycles, and the coherent integration
of these into iv) a multi-stage authentication technique. IDNet is the first
system that exploits a deep learning approach as universal feature extractors
for gait recognition, and that combines classification results from subsequent
walking cycles into a multi-stage decision making framework. Experimental
results show the superiority of our approach against state-of-the-art
techniques, leading to misclassification rates (either false negatives or
positives) smaller than 0.15% with fewer than five walking cycles. Design
choices are discussed and motivated throughout, assessing their impact on the
user authentication performance.
|
An Application of Network Lasso Optimization For Ride Sharing Prediction | Ride sharing has important implications in terms of environmental, social and
individual goals by reducing carbon footprints, fostering social interactions
and economizing commuter costs. The ride sharing systems that are commonly
available lack adaptive and scalable techniques that can simultaneously learn
from the large scale data and predict in real-time dynamic fashion. In this
paper, we study such a problem towards a smart city initiative, where a generic
ride sharing system is conceived capable of making predictions about ride share
opportunities based on the historically recorded data while satisfying
real-time ride requests. Underpinning the system is an application of a
powerful machine learning convex optimization framework called Network Lasso
that uses the Alternate Direction Method of Multipliers (ADMM) optimization for
learning and dynamic prediction. We propose an application of a robust and
scalable unified optimization framework within the ride sharing case-study. The
application of Network Lasso framework is capable of jointly optimizing and
clustering different rides based on their spatial and model similarity. The
prediction from the framework clusters new ride requests, making accurate price
prediction based on the clusters, detecting hidden correlations in the data and
allowing fast convergence due to the network topology. We provide an empirical
evaluation of the application of ADMM network Lasso on real trip record and
simulated data, proving their effectiveness since the mean squared error of the
algorithm's prediction is minimized on the test rides.
|
Memory-Efficient Backpropagation Through Time | We propose a novel approach to reduce memory consumption of the
backpropagation through time (BPTT) algorithm when training recurrent neural
networks (RNNs). Our approach uses dynamic programming to balance a trade-off
between caching of intermediate results and recomputation. The algorithm is
capable of tightly fitting within almost any user-set memory budget while
finding an optimal execution policy minimizing the computational cost.
Computational devices have limited memory capacity and maximizing a
computational performance given a fixed memory budget is a practical use-case.
We provide asymptotic computational upper bounds for various regimes. The
algorithm is particularly effective for long sequences. For sequences of length
1000, our algorithm saves 95\% of memory usage while using only one third more
time per iteration than the standard BPTT.
|
Scan Order in Gibbs Sampling: Models in Which it Matters and Bounds on
How Much | Gibbs sampling is a Markov Chain Monte Carlo sampling technique that
iteratively samples variables from their conditional distributions. There are
two common scan orders for the variables: random scan and systematic scan. Due
to the benefits of locality in hardware, systematic scan is commonly used, even
though most statistical guarantees are only for random scan. While it has been
conjectured that the mixing times of random scan and systematic scan do not
differ by more than a logarithmic factor, we show by counterexample that this
is not the case, and we prove that that the mixing times do not differ by more
than a polynomial factor under mild conditions. To prove these relative bounds,
we introduce a method of augmenting the state space to study systematic scan
using conductance.
|
Deep Directed Generative Models with Energy-Based Probability Estimation | Training energy-based probabilistic models is confronted with apparently
intractable sums, whose Monte Carlo estimation requires sampling from the
estimated probability distribution in the inner loop of training. This can be
approximately achieved by Markov chain Monte Carlo methods, but may still face
a formidable obstacle that is the difficulty of mixing between modes with sharp
concentrations of probability. Whereas an MCMC process is usually derived from
a given energy function based on mathematical considerations and requires an
arbitrarily long time to obtain good and varied samples, we propose to train a
deep directed generative model (not a Markov chain) so that its sampling
distribution approximately matches the energy function that is being trained.
Inspired by generative adversarial networks, the proposed framework involves
training of two models that represent dual views of the estimated probability
distribution: the energy function (mapping an input configuration to a scalar
energy value) and the generator (mapping a noise vector to a generated
configuration), both represented by deep neural networks.
|
Learning overcomplete, low coherence dictionaries with linear inference | Finding overcomplete latent representations of data has applications in data
analysis, signal processing, machine learning, theoretical neuroscience and
many other fields. In an overcomplete representation, the number of latent
features exceeds the data dimensionality, which is useful when the data is
undersampled by the measurements (compressed sensing, information bottlenecks
in neural systems) or composed from multiple complete sets of linear features,
each spanning the data space. Independent Components Analysis (ICA) is a linear
technique for learning sparse latent representations, which typically has a
lower computational cost than sparse coding, its nonlinear, recurrent
counterpart. While well suited for finding complete representations, we show
that overcompleteness poses a challenge to existing ICA algorithms.
Specifically, the coherence control in existing ICA algorithms, necessary to
prevent the formation of duplicate dictionary features, is ill-suited in the
overcomplete case. We show that in this case several existing ICA algorithms
have undesirable global minima that maximize coherence. Further, by comparing
ICA algorithms on synthetic data and natural images to the computationally more
expensive sparse coding solution, we show that the coherence control biases the
exploration of the data manifold, sometimes yielding suboptimal solutions. We
provide a theoretical explanation of these failures and, based on the theory,
propose improved overcomplete ICA algorithms. All told, this study contributes
new insights into and methods for coherence control for linear ICA, some of
which are applicable to many other, potentially nonlinear, unsupervised
learning methods.
|
Generative Adversarial Imitation Learning | Consider learning a policy from example expert behavior, without interaction
with the expert or access to reinforcement signal. One approach is to recover
the expert's cost function with inverse reinforcement learning, then extract a
policy from that cost function with reinforcement learning. This approach is
indirect and can be slow. We propose a new general framework for directly
extracting a policy from data, as if it were obtained by reinforcement learning
following inverse reinforcement learning. We show that a certain instantiation
of our framework draws an analogy between imitation learning and generative
adversarial networks, from which we derive a model-free imitation learning
algorithm that obtains significant performance gains over existing model-free
methods in imitating complex behaviors in large, high-dimensional environments.
|
The Mythos of Model Interpretability | Supervised machine learning models boast remarkable predictive capabilities.
But can you trust your model? Will it work in deployment? What else can it tell
you about the world? We want models to be not only good, but interpretable. And
yet the task of interpretation appears underspecified. Papers provide diverse
and sometimes non-overlapping motivations for interpretability, and offer
myriad notions of what attributes render models interpretable. Despite this
ambiguity, many papers proclaim interpretability axiomatically, absent further
explanation. In this paper, we seek to refine the discourse on
interpretability. First, we examine the motivations underlying interest in
interpretability, finding them to be diverse and occasionally discordant. Then,
we address model properties and techniques thought to confer interpretability,
identifying transparency to humans and post-hoc explanations as competing
notions. Throughout, we discuss the feasibility and desirability of different
notions, and question the oft-made assertions that linear models are
interpretable and that deep neural networks are not.
|
Improved Techniques for Training GANs | We present a variety of new architectural features and training procedures
that we apply to the generative adversarial networks (GANs) framework. We focus
on two applications of GANs: semi-supervised learning, and the generation of
images that humans find visually realistic. Unlike most work on generative
models, our primary goal is not to train a model that assigns high likelihood
to test data, nor do we require the model to be able to learn well without
using any labels. Using our new techniques, we achieve state-of-the-art results
in semi-supervised classification on MNIST, CIFAR-10 and SVHN. The generated
images are of high quality as confirmed by a visual Turing test: our model
generates MNIST samples that humans cannot distinguish from real data, and
CIFAR-10 samples that yield a human error rate of 21.3%. We also present
ImageNet samples with unprecedented resolution and show that our methods enable
the model to learn recognizable features of ImageNet classes.
|
Distributed Machine Learning in Materials that Couple Sensing,
Actuation, Computation and Communication | This paper reviews machine learning applications and approaches to detection,
classification and control of intelligent materials and structures with
embedded distributed computation elements. The purpose of this survey is to
identify desired tasks to be performed in each type of material or structure
(e.g., damage detection in composites), identify and compare common approaches
to learning such tasks, and investigate models and training paradigms used.
Machine learning approaches and common temporal features used in the domains of
structural health monitoring, morphable aircraft, wearable computing and
robotic skins are explored. As the ultimate goal of this research is to
incorporate the approaches described in this survey into a robotic material
paradigm, the potential for adapting the computational models used in these
applications, and corresponding training algorithms, to an amorphous network of
computing nodes is considered. Distributed versions of support vector machines,
graphical models and mixture models developed in the field of wireless sensor
networks are reviewed. Potential areas of investigation, including possible
architectures for incorporating machine learning into robotic nodes, training
approaches, and the possibility of using deep learning approaches for automatic
feature extraction, are discussed.
|
TRex: A Tomography Reconstruction Proximal Framework for Robust Sparse
View X-Ray Applications | We present TRex, a flexible and robust Tomographic Reconstruction framework
using proximal algorithms. We provide an overview and perform an experimental
comparison between the famous iterative reconstruction methods in terms of
reconstruction quality in sparse view situations. We then derive the proximal
operators for the four best methods. We show the flexibility of our framework
by deriving solvers for two noise models: Gaussian and Poisson; and by plugging
in three powerful regularizers. We compare our framework to state of the art
methods, and show superior quality on both synthetic and real datasets.
|
Drug response prediction by inferring pathway-response associations with
Kernelized Bayesian Matrix Factorization | A key goal of computational personalized medicine is to systematically
utilize genomic and other molecular features of samples to predict drug
responses for a previously unseen sample. Such predictions are valuable for
developing hypotheses for selecting therapies tailored for individual patients.
This is especially valuable in oncology, where molecular and genetic
heterogeneity of the cells has a major impact on the response. However, the
prediction task is extremely challenging, raising the need for methods that can
effectively model and predict drug responses. In this study, we propose a novel
formulation of multi-task matrix factorization that allows selective data
integration for predicting drug responses. To solve the modeling task, we
extend the state-of-the-art kernelized Bayesian matrix factorization (KBMF)
method with component-wise multiple kernel learning. In addition, our approach
exploits the known pathway information in a novel and biologically meaningful
fashion to learn the drug response associations. Our method quantitatively
outperforms the state of the art on predicting drug responses in two publicly
available cancer data sets as well as on a synthetic data set. In addition, we
validated our model predictions with lab experiments using an in-house cancer
cell line panel. We finally show the practical applicability of the proposed
method by utilizing prior knowledge to infer pathway-drug response
associations, opening up the opportunity for elucidating drug action
mechanisms. We demonstrate that pathway-response associations can be learned by
the proposed model for the well known EGFR and MEK inhibitors.
|
metricDTW: local distance metric learning in Dynamic Time Warping | We propose to learn multiple local Mahalanobis distance metrics to perform
k-nearest neighbor (kNN) classification of temporal sequences. Temporal
sequences are first aligned by dynamic time warping (DTW); given the alignment
path, similarity between two sequences is measured by the DTW distance, which
is computed as the accumulated distance between matched temporal point pairs
along the alignment path. Traditionally, Euclidean metric is used for distance
computation between matched pairs, which ignores the data regularities and
might not be optimal for applications at hand. Here we propose to learn
multiple Mahalanobis metrics, such that DTW distance becomes the sum of
Mahalanobis distances. We adapt the large margin nearest neighbor (LMNN)
framework to our case, and formulate multiple metric learning as a linear
programming problem. Extensive sequence classification results show that our
proposed multiple metrics learning approach is effective, insensitive to the
preceding alignment qualities, and reaches the state-of-the-art performances on
UCR time series datasets.
|
InfoGAN: Interpretable Representation Learning by Information Maximizing
Generative Adversarial Nets | This paper describes InfoGAN, an information-theoretic extension to the
Generative Adversarial Network that is able to learn disentangled
representations in a completely unsupervised manner. InfoGAN is a generative
adversarial network that also maximizes the mutual information between a small
subset of the latent variables and the observation. We derive a lower bound to
the mutual information objective that can be optimized efficiently, and show
that our training procedure can be interpreted as a variation of the Wake-Sleep
algorithm. Specifically, InfoGAN successfully disentangles writing styles from
digit shapes on the MNIST dataset, pose from lighting of 3D rendered images,
and background digits from the central digit on the SVHN dataset. It also
discovers visual concepts that include hair styles, presence/absence of
eyeglasses, and emotions on the CelebA face dataset. Experiments show that
InfoGAN learns interpretable representations that are competitive with
representations learned by existing fully supervised methods.
|
Weakly Supervised Scalable Audio Content Analysis | Audio Event Detection is an important task for content analysis of multimedia
data. Most of the current works on detection of audio events is driven through
supervised learning approaches. We propose a weakly supervised learning
framework which can make use of the tremendous amount of web multimedia data
with significantly reduced annotation effort and expense. Specifically, we use
several multiple instance learning algorithms to show that audio event
detection through weak labels is feasible. We also propose a novel scalable
multiple instance learning algorithm and show that its competitive with other
multiple instance learning algorithms for audio event detection tasks.
|
Deep Reinforcement Learning with a Combinatorial Action Space for
Predicting Popular Reddit Threads | We introduce an online popularity prediction and tracking task as a benchmark
task for reinforcement learning with a combinatorial, natural language action
space. A specified number of discussion threads predicted to be popular are
recommended, chosen from a fixed window of recent comments to track. Novel deep
reinforcement learning architectures are studied for effective modeling of the
value function associated with actions comprised of interdependent sub-actions.
The proposed model, which represents dependence between sub-actions through a
bi-directional LSTM, gives the best performance across different experimental
configurations and domains, and it also generalizes well with varying numbers
of recommendation requests.
|
Comparison of Several Sparse Recovery Methods for Low Rank Matrices with
Random Samples | In this paper, we will investigate the efficacy of IMAT (Iterative Method of
Adaptive Thresholding) in recovering the sparse signal (parameters) for linear
models with missing data. Sparse recovery rises in compressed sensing and
machine learning problems and has various applications necessitating viable
reconstruction methods specifically when we work with big data. This paper will
focus on comparing the power of IMAT in reconstruction of the desired sparse
signal with LASSO. Additionally, we will assume the model has random missing
information. Missing data has been recently of interest in big data and machine
learning problems since they appear in many cases including but not limited to
medical imaging datasets, hospital datasets, and massive MIMO. The dominance of
IMAT over the well-known LASSO will be taken into account in different
scenarios. Simulations and numerical results are also provided to verify the
arguments.
|
Efficient KLMS and KRLS Algorithms: A Random Fourier Feature Perspective | We present a new framework for online Least Squares algorithms for nonlinear
modeling in RKH spaces (RKHS). Instead of implicitly mapping the data to a RKHS
(e.g., kernel trick), we map the data to a finite dimensional Euclidean space,
using random features of the kernel's Fourier transform. The advantage is that,
the inner product of the mapped data approximates the kernel function. The
resulting "linear" algorithm does not require any form of sparsification,
since, in contrast to all existing algorithms, the solution's size remains
fixed and does not increase with the iteration steps. As a result, the obtained
algorithms are computationally significantly more efficient compared to
previously derived variants, while, at the same time, they converge at similar
speeds and to similar error floors.
|
Neural Belief Tracker: Data-Driven Dialogue State Tracking | One of the core components of modern spoken dialogue systems is the belief
tracker, which estimates the user's goal at every step of the dialogue.
However, most current approaches have difficulty scaling to larger, more
complex dialogue domains. This is due to their dependency on either: a) Spoken
Language Understanding models that require large amounts of annotated training
data; or b) hand-crafted lexicons for capturing some of the linguistic
variation in users' language. We propose a novel Neural Belief Tracking (NBT)
framework which overcomes these problems by building on recent advances in
representation learning. NBT models reason over pre-trained word vectors,
learning to compose them into distributed representations of user utterances
and dialogue context. Our evaluation on two datasets shows that this approach
surpasses past limitations, matching the performance of state-of-the-art models
which rely on hand-crafted semantic lexicons and outperforming them when such
lexicons are not provided.
|
Retrieving and Ranking Similar Questions from Question-Answer Archives
Using Topic Modelling and Topic Distribution Regression | Presented herein is a novel model for similar question ranking within
collaborative question answer platforms. The presented approach integrates a
regression stage to relate topics derived from questions to those derived from
question-answer pairs. This helps to avoid problems caused by the differences
in vocabulary used within questions and answers, and the tendency for questions
to be shorter than answers. The performance of the model is shown to outperform
translation methods and topic modelling (without regression) on several
real-world datasets.
|
Open-Set Support Vector Machines | Often, when dealing with real-world recognition problems, we do not need, and
often cannot have, knowledge of the entire set of possible classes that might
appear during operational testing. In such cases, we need to think of robust
classification methods able to deal with the "unknown" and properly reject
samples belonging to classes never seen during training. Notwithstanding,
existing classifiers to date were mostly developed for the closed-set scenario,
i.e., the classification setup in which it is assumed that all test samples
belong to one of the classes with which the classifier was trained. In the
open-set scenario, however, a test sample can belong to none of the known
classes and the classifier must properly reject it by classifying it as
unknown. In this work, we extend upon the well-known Support Vector Machines
(SVM) classifier and introduce the Open-Set Support Vector Machines (OSSVM),
which is suitable for recognition in open-set setups. OSSVM balances the
empirical risk and the risk of the unknown and ensures that the region of the
feature space in which a test sample would be classified as known (one of the
known classes) is always bounded, ensuring a finite risk of the unknown. In
this work, we also highlight the properties of the SVM classifier related to
the open-set scenario, and provide necessary and sufficient conditions for an
RBF SVM to have bounded open-space risk.
|
Efficient Learning with a Family of Nonconvex Regularizers by
Redistributing Nonconvexity | The use of convex regularizers allows for easy optimization, though they
often produce biased estimation and inferior prediction performance. Recently,
nonconvex regularizers have attracted a lot of attention and outperformed
convex ones. However, the resultant optimization problem is much harder. In
this paper, for a large class of nonconvex regularizers, we propose to move the
nonconvexity from the regularizer to the loss. The nonconvex regularizer is
then transformed to a familiar convex regularizer, while the resultant loss
function can still be guaranteed to be smooth. Learning with the convexified
regularizer can be performed by existing efficient algorithms originally
designed for convex regularizers (such as the proximal algorithm, Frank-Wolfe
algorithm, alternating direction method of multipliers and stochastic gradient
descent). Extensions are made when the convexified regularizer does not have
closed-form proximal step, and when the loss function is nonconvex, nonsmooth.
Extensive experiments on a variety of machine learning application scenarios
show that optimizing the transformed problem is much faster than running the
state-of-the-art on the original problem.
|
Sorting out typicality with the inverse moment matrix SOS polynomial | We study a surprising phenomenon related to the representation of a cloud of
data points using polynomials. We start with the previously unnoticed empirical
observation that, given a collection (a cloud) of data points, the sublevel
sets of a certain distinguished polynomial capture the shape of the cloud very
accurately. This distinguished polynomial is a sum-of-squares (SOS) derived in
a simple manner from the inverse of the empirical moment matrix. In fact, this
SOS polynomial is directly related to orthogonal polynomials and the
Christoffel function. This allows to generalize and interpret extremality
properties of orthogonal polynomials and to provide a mathematical rationale
for the observed phenomenon. Among diverse potential applications, we
illustrate the relevance of our results on a network intrusion detection task
for which we obtain performances similar to existing dedicated methods reported
in the literature.
|
Robust Probabilistic Modeling with Bayesian Data Reweighting | Probabilistic models analyze data by relying on a set of assumptions. Data
that exhibit deviations from these assumptions can undermine inference and
prediction quality. Robust models offer protection against mismatch between a
model's assumptions and reality. We propose a way to systematically detect and
mitigate mismatch of a large class of probabilistic models. The idea is to
raise the likelihood of each observation to a weight and then to infer both the
latent variables and the weights from data. Inferring the weights allows a
model to identify observations that match its assumptions and down-weight
others. This enables robust inference and improves predictive accuracy. We
study four different forms of mismatch with reality, ranging from missing
latent groups to structure misspecification. A Poisson factorization analysis
of the Movielens 1M dataset shows the benefits of this approach in a practical
scenario.
|
Neural Associative Memory for Dual-Sequence Modeling | Many important NLP problems can be posed as dual-sequence or
sequence-to-sequence modeling tasks. Recent advances in building end-to-end
neural architectures have been highly successful in solving such tasks. In this
work we propose a new architecture for dual-sequence modeling that is based on
associative memory. We derive AM-RNNs, a recurrent associative memory (AM)
which augments generic recurrent neural networks (RNN). This architecture is
extended to the Dual AM-RNN which operates on two AMs at once. Our models
achieve very competitive results on textual entailment. A qualitative analysis
demonstrates that long range dependencies between source and target-sequence
can be bridged effectively using Dual AM-RNNs. However, an initial experiment
on auto-encoding reveals that these benefits are not exploited by the system
when learning to solve sequence-to-sequence tasks which indicates that
additional supervision or regularization is needed.
|
Inferring Sparsity: Compressed Sensing using Generalized Restricted
Boltzmann Machines | In this work, we consider compressed sensing reconstruction from $M$
measurements of $K$-sparse structured signals which do not possess a writable
correlation model. Assuming that a generative statistical model, such as a
Boltzmann machine, can be trained in an unsupervised manner on example signals,
we demonstrate how this signal model can be used within a Bayesian framework of
signal reconstruction. By deriving a message-passing inference for general
distribution restricted Boltzmann machines, we are able to integrate these
inferred signal models into approximate message passing for compressed sensing
reconstruction. Finally, we show for the MNIST dataset that this approach can
be very effective, even for $M < K$.
|
Making Contextual Decisions with Low Technical Debt | Applications and systems are constantly faced with decisions that require
picking from a set of actions based on contextual information.
Reinforcement-based learning algorithms such as contextual bandits can be very
effective in these settings, but applying them in practice is fraught with
technical debt, and no general system exists that supports them completely. We
address this and create the first general system for contextual learning,
called the Decision Service.
Existing systems often suffer from technical debt that arises from issues
like incorrect data collection and weak debuggability, issues we systematically
address through our ML methodology and system abstractions. The Decision
Service enables all aspects of contextual bandit learning using four system
abstractions which connect together in a loop: explore (the decision space),
log, learn, and deploy. Notably, our new explore and log abstractions ensure
the system produces correct, unbiased data, which our learner uses for online
learning and to enable real-time safeguards, all in a fully reproducible
manner.
The Decision Service has a simple user interface and works with a variety of
applications: we present two live production deployments for content
recommendation that achieved click-through improvements of 25-30%, another with
18% revenue lift in the landing page, and ongoing applications in tech support
and machine failure handling. The service makes real-time decisions and learns
continuously and scalably, while significantly lowering technical debt.
|
Estimating individual treatment effect: generalization bounds and
algorithms | There is intense interest in applying machine learning to problems of causal
inference in fields such as healthcare, economics and education. In particular,
individual-level causal inference has important applications such as precision
medicine. We give a new theoretical analysis and family of algorithms for
predicting individual treatment effect (ITE) from observational data, under the
assumption known as strong ignorability. The algorithms learn a "balanced"
representation such that the induced treated and control distributions look
similar. We give a novel, simple and intuitive generalization-error bound
showing that the expected ITE estimation error of a representation is bounded
by a sum of the standard generalization-error of that representation and the
distance between the treated and control distributions induced by the
representation. We use Integral Probability Metrics to measure distances
between distributions, deriving explicit bounds for the Wasserstein and Maximum
Mean Discrepancy (MMD) distances. Experiments on real and simulated data show
the new algorithms match or outperform the state-of-the-art.
|
Trace Norm Regularised Deep Multi-Task Learning | We propose a framework for training multiple neural networks simultaneously.
The parameters from all models are regularised by the tensor trace norm, so
that each neural network is encouraged to reuse others' parameters if possible
-- this is the main motivation behind multi-task learning. In contrast to many
deep multi-task learning models, we do not predefine a parameter sharing
strategy by specifying which layers have tied parameters. Instead, our
framework considers sharing for all shareable layers, and the sharing strategy
is learned in a data-driven way.
|
On the exact learnability of graph parameters: The case of partition
functions | We study the exact learnability of real valued graph parameters $f$ which are
known to be representable as partition functions which count the number of
weighted homomorphisms into a graph $H$ with vertex weights $\alpha$ and edge
weights $\beta$. M. Freedman, L. Lov\'asz and A. Schrijver have given a
characterization of these graph parameters in terms of the $k$-connection
matrices $C(f,k)$ of $f$. Our model of learnability is based on D. Angluin's
model of exact learning using membership and equivalence queries. Given such a
graph parameter $f$, the learner can ask for the values of $f$ for graphs of
their choice, and they can formulate hypotheses in terms of the connection
matrices $C(f,k)$ of $f$. The teacher can accept the hypothesis as correct, or
provide a counterexample consisting of a graph. Our main result shows that in
this scenario, a very large class of partition functions, the rigid partition
functions, can be learned in time polynomial in the size of $H$ and the size of
the largest counterexample in the Blum-Shub-Smale model of computation over the
reals with unit cost.
|
Matching Networks for One Shot Learning | Learning from a few examples remains a key challenge in machine learning.
Despite recent advances in important domains such as vision and language, the
standard supervised deep learning paradigm does not offer a satisfactory
solution for learning new concepts rapidly from little data. In this work, we
employ ideas from metric learning based on deep neural features and from recent
advances that augment neural networks with external memories. Our framework
learns a network that maps a small labelled support set and an unlabelled
example to its label, obviating the need for fine-tuning to adapt to new class
types. We then define one-shot learning problems on vision (using Omniglot,
ImageNet) and language tasks. Our algorithm improves one-shot accuracy on
ImageNet from 87.6% to 93.2% and from 88.0% to 93.8% on Omniglot compared to
competing approaches. We also demonstrate the usefulness of the same model on
language modeling by introducing a one-shot task on the Penn Treebank.
|
Modeling Missing Data in Clinical Time Series with RNNs | We demonstrate a simple strategy to cope with missing data in sequential
inputs, addressing the task of multilabel classification of diagnoses given
clinical time series. Collected from the pediatric intensive care unit (PICU)
at Children's Hospital Los Angeles, our data consists of multivariate time
series of observations. The measurements are irregularly spaced, leading to
missingness patterns in temporally discretized sequences. While these artifacts
are typically handled by imputation, we achieve superior predictive performance
by treating the artifacts as features. Unlike linear models, recurrent neural
networks can realize this improvement using only simple binary indicators of
missingness. For linear models, we show an alternative strategy to capture this
signal. Training models on missingness patterns only, we show that for some
diseases, what tests are run can be as predictive as the results themselves.
|
Mutual information for symmetric rank-one matrix estimation: A proof of
the replica formula | Factorizing low-rank matrices has many applications in machine learning and
statistics. For probabilistic models in the Bayes optimal setting, a general
expression for the mutual information has been proposed using heuristic
statistical physics computations, and proven in few specific cases. Here, we
show how to rigorously prove the conjectured formula for the symmetric rank-one
case. This allows to express the minimal mean-square-error and to characterize
the detectability phase transitions in a large set of estimation problems
ranging from community detection to sparse PCA. We also show that for a large
set of parameters, an iterative algorithm called approximate message-passing is
Bayes optimal. There exists, however, a gap between what currently known
polynomial algorithms can do and what is expected information theoretically.
Additionally, the proof technique has an interest of its own and exploits three
essential ingredients: the interpolation method introduced in statistical
physics by Guerra, the analysis of the approximate message-passing algorithm
and the theory of spatial coupling and threshold saturation in coding. Our
approach is generic and applicable to other open problems in statistical
estimation where heuristic statistical physics predictions are available.
|
Sample Complexity of Automated Mechanism Design | The design of revenue-maximizing combinatorial auctions, i.e. multi-item
auctions over bundles of goods, is one of the most fundamental problems in
computational economics, unsolved even for two bidders and two items for sale.
In the traditional economic models, it is assumed that the bidders' valuations
are drawn from an underlying distribution and that the auction designer has
perfect knowledge of this distribution. Despite this strong and oftentimes
unrealistic assumption, it is remarkable that the revenue-maximizing
combinatorial auction remains unknown. In recent years, automated mechanism
design has emerged as one of the most practical and promising approaches to
designing high-revenue combinatorial auctions. The most scalable automated
mechanism design algorithms take as input samples from the bidders' valuation
distribution and then search for a high-revenue auction in a rich auction
class. In this work, we provide the first sample complexity analysis for the
standard hierarchy of deterministic combinatorial auction classes used in
automated mechanism design. In particular, we provide tight sample complexity
bounds on the number of samples needed to guarantee that the empirical revenue
of the designed mechanism on the samples is close to its expected revenue on
the underlying, unknown distribution over bidder valuations, for each of the
auction classes in the hierarchy. In addition to helping set automated
mechanism design on firm foundations, our results also push the boundaries of
learning theory. In particular, the hypothesis functions used in our contexts
are defined through multi-stage combinatorial optimization procedures, rather
than simple decision boundaries, as are common in machine learning.
|
The Crossover Process: Learnability and Data Protection from Inference
Attacks | It is usual to consider data protection and learnability as conflicting
objectives. This is not always the case: we show how to jointly control
inference --- seen as the attack --- and learnability by a noise-free process
that mixes training examples, the Crossover Process (cp). One key point is that
the cp~is typically able to alter joint distributions without touching on
marginals, nor altering the sufficient statistic for the class. In other words,
it saves (and sometimes improves) generalization for supervised learning, but
can alter the relationship between covariates --- and therefore fool measures
of nonlinear independence and causal inference into misleading ad-hoc
conclusions. For example, a cp~can increase / decrease odds ratios, bring
fairness or break fairness, tamper with disparate impact, strengthen, weaken or
reverse causal directions, change observed statistical measures of dependence.
For each of these, we quantify changes brought by a cp, as well as its
statistical impact on generalization abilities via a new complexity measure
that we call the Rademacher cp~complexity. Experiments on a dozen readily
available domains validate the theory.
|
Modal-set estimation with an application to clustering | We present a first procedure that can estimate -- with statistical
consistency guarantees -- any local-maxima of a density, under benign
distributional conditions. The procedure estimates all such local maxima, or
$\textit{modal-sets}$, of any bounded shape or dimension, including usual
point-modes. In practice, modal-sets can arise as dense low-dimensional
structures in noisy data, and more generally serve to better model the rich
variety of locally-high-density structures in data.
The procedure is then shown to be competitive on clustering applications, and
moreover is quite stable to a wide range of settings of its tuning parameter.
|
Inverting face embeddings with convolutional neural networks | Deep neural networks have dramatically advanced the state of the art for many
areas of machine learning. Recently they have been shown to have a remarkable
ability to generate highly complex visual artifacts such as images and text
rather than simply recognize them.
In this work we use neural networks to effectively invert low-dimensional
face embeddings while producing realistically looking consistent images. Our
contribution is twofold, first we show that a gradient ascent style approaches
can be used to reproduce consistent images, with a help of a guiding image.
Second, we demonstrate that we can train a separate neural network to
effectively solve the minimization problem in one pass, and generate images in
real-time. We then evaluate the loss imposed by using a neural network instead
of the gradient descent by comparing the final values of the minimized loss
function.
|
Deep Recurrent Models with Fast-Forward Connections for Neural Machine
Translation | Neural machine translation (NMT) aims at solving machine translation (MT)
problems using neural networks and has exhibited promising results in recent
years. However, most of the existing NMT models are shallow and there is still
a performance gap between a single NMT model and the best conventional MT
system. In this work, we introduce a new type of linear connections, named
fast-forward connections, based on deep Long Short-Term Memory (LSTM) networks,
and an interleaved bi-directional architecture for stacking the LSTM layers.
Fast-forward connections play an essential role in propagating the gradients
and building a deep topology of depth 16. On the WMT'14 English-to-French task,
we achieve BLEU=37.7 with a single attention model, which outperforms the
corresponding single shallow model by 6.2 BLEU points. This is the first time
that a single NMT model achieves state-of-the-art performance and outperforms
the best conventional model by 0.7 BLEU points. We can still achieve BLEU=36.3
even without using an attention mechanism. After special handling of unknown
words and model ensembling, we obtain the best score reported to date on this
task with BLEU=40.4. Our models are also validated on the more difficult WMT'14
English-to-German task.
|
Conditional Generative Moment-Matching Networks | Maximum mean discrepancy (MMD) has been successfully applied to learn deep
generative models for characterizing a joint distribution of variables via
kernel mean embedding. In this paper, we present conditional generative moment-
matching networks (CGMMN), which learn a conditional distribution given some
input variables based on a conditional maximum mean discrepancy (CMMD)
criterion. The learning is performed by stochastic gradient descent with the
gradient calculated by back-propagation. We evaluate CGMMN on a wide range of
tasks, including predictive modeling, contextual generation, and Bayesian dark
knowledge, which distills knowledge from a Bayesian model by learning a
relatively small CGMMN student network. Our results demonstrate competitive
performance in all the tasks.
|
DCNNs on a Diet: Sampling Strategies for Reducing the Training Set Size | Large-scale supervised classification algorithms, especially those based on
deep convolutional neural networks (DCNNs), require vast amounts of training
data to achieve state-of-the-art performance. Decreasing this data requirement
would significantly speed up the training process and possibly improve
generalization. Motivated by this objective, we consider the task of adaptively
finding concise training subsets which will be iteratively presented to the
learner. We use convex optimization methods, based on an objective criterion
and feedback from the current performance of the classifier, to efficiently
identify informative samples to train on. We propose an algorithm to decompose
the optimization problem into smaller per-class problems, which can be solved
in parallel. We test our approach on standard classification tasks and
demonstrate its effectiveness in decreasing the training set size without
compromising performance. We also show that our approach can make the
classifier more robust in the presence of label noise and class imbalance.
|
Context-Aware Proactive Content Caching with Service Differentiation in
Wireless Networks | Content caching in small base stations or wireless infostations is considered
to be a suitable approach to improve the efficiency in wireless content
delivery. Placing the optimal content into local caches is crucial due to
storage limitations, but it requires knowledge about the content popularity
distribution, which is often not available in advance. Moreover, local content
popularity is subject to fluctuations since mobile users with different
interests connect to the caching entity over time. Which content a user prefers
may depend on the user's context. In this paper, we propose a novel algorithm
for context-aware proactive caching. The algorithm learns context-specific
content popularity online by regularly observing context information of
connected users, updating the cache content and observing cache hits
subsequently. We derive a sublinear regret bound, which characterizes the
learning speed and proves that our algorithm converges to the optimal cache
content placement strategy in terms of maximizing the number of cache hits.
Furthermore, our algorithm supports service differentiation by allowing
operators of caching entities to prioritize customer groups. Our numerical
results confirm that our algorithm outperforms state-of-the-art algorithms in a
real world data set, with an increase in the number of cache hits of at least
14%.
|
Local Canonical Correlation Analysis for Nonlinear Common Variables
Discovery | In this paper, we address the problem of hidden common variables discovery
from multimodal data sets of nonlinear high-dimensional observations. We
present a metric based on local applications of canonical correlation analysis
(CCA) and incorporate it in a kernel-based manifold learning technique.We show
that this metric discovers the hidden common variables underlying the
multimodal observations by estimating the Euclidean distance between them. Our
approach can be viewed both as an extension of CCA to a nonlinear setting as
well as an extension of manifold learning to multiple data sets. Experimental
results show that our method indeed discovers the common variables underlying
high-dimensional nonlinear observations without assuming prior rigid model
assumptions.
|
Context Trees: Augmenting Geospatial Trajectories with Context | Exposing latent knowledge in geospatial trajectories has the potential to
provide a better understanding of the movements of individuals and groups.
Motivated by such a desire, this work presents the context tree, a new
hierarchical data structure that summarises the context behind user actions in
a single model. We propose a method for context tree construction that augments
geospatial trajectories with land usage data to identify such contexts. Through
evaluation of the construction method and analysis of the properties of
generated context trees, we demonstrate the foundation for understanding and
modelling behaviour afforded. Summarising user contexts into a single data
structure gives easy access to information that would otherwise remain latent,
providing the basis for better understanding and predicting the actions and
behaviours of individuals and groups. Finally, we also present a method for
pruning context trees, for use in applications where it is desirable to reduce
the size of the tree while retaining useful information.
|
Efficient Pairwise Learning Using Kernel Ridge Regression: an Exact
Two-Step Method | Pairwise learning or dyadic prediction concerns the prediction of properties
for pairs of objects. It can be seen as an umbrella covering various machine
learning problems such as matrix completion, collaborative filtering,
multi-task learning, transfer learning, network prediction and zero-shot
learning. In this work we analyze kernel-based methods for pairwise learning,
with a particular focus on a recently-suggested two-step method. We show that
this method offers an appealing alternative for commonly-applied
Kronecker-based methods that model dyads by means of pairwise feature
representations and pairwise kernels. In a series of theoretical results, we
establish correspondences between the two types of methods in terms of linear
algebra and spectral filtering, and we analyze their statistical consistency.
In addition, the two-step method allows us to establish novel algorithmic
shortcuts for efficient training and validation on very large datasets. Putting
those properties together, we believe that this simple, yet powerful method can
become a standard tool for many problems. Extensive experimental results for a
range of practical settings are reported.
|
Exact and efficient top-K inference for multi-target prediction by
querying separable linear relational models | Many complex multi-target prediction problems that concern large target
spaces are characterised by a need for efficient prediction strategies that
avoid the computation of predictions for all targets explicitly. Examples of
such problems emerge in several subfields of machine learning, such as
collaborative filtering, multi-label classification, dyadic prediction and
biological network inference. In this article we analyse efficient and exact
algorithms for computing the top-$K$ predictions in the above problem settings,
using a general class of models that we refer to as separable linear relational
models. We show how to use those inference algorithms, which are modifications
of well-known information retrieval methods, in a variety of machine learning
settings. Furthermore, we study the possibility of scoring items incompletely,
while still retaining an exact top-K retrieval. Experimental results in several
application domains reveal that the so-called threshold algorithm is very
scalable, performing often many orders of magnitude more efficiently than the
naive approach.
|
Automatic Text Scoring Using Neural Networks | Automated Text Scoring (ATS) provides a cost-effective and consistent
alternative to human marking. However, in order to achieve good performance,
the predictive features of the system need to be manually engineered by human
experts. We introduce a model that forms word representations by learning the
extent to which specific words contribute to the text's score. Using Long-Short
Term Memory networks to represent the meaning of texts, we demonstrate that a
fully automated framework is able to achieve excellent results over similar
approaches. In an attempt to make our results more interpretable, and inspired
by recent advances in visualizing neural networks, we introduce a novel method
for identifying the regions of the text that the model has found more
discriminative.
|
Time for a change: a tutorial for comparing multiple classifiers through
Bayesian analysis | The machine learning community adopted the use of null hypothesis
significance testing (NHST) in order to ensure the statistical validity of
results. Many scientific fields however realized the shortcomings of
frequentist reasoning and in the most radical cases even banned its use in
publications. We should do the same: just as we have embraced the Bayesian
paradigm in the development of new machine learning methods, so we should also
use it in the analysis of our own results. We argue for abandonment of NHST by
exposing its fallacies and, more importantly, offer better - more sound and
useful - alternatives for it.
|
Calibration of Phone Likelihoods in Automatic Speech Recognition | In this paper we study the probabilistic properties of the posteriors in a
speech recognition system that uses a deep neural network (DNN) for acoustic
modeling. We do this by reducing Kaldi's DNN shared pdf-id posteriors to phone
likelihoods, and using test set forced alignments to evaluate these using a
calibration sensitive metric. Individual frame posteriors are in principle
well-calibrated, because the DNN is trained using cross entropy as the
objective function, which is a proper scoring rule. When entire phones are
assessed, we observe that it is best to average the log likelihoods over the
duration of the phone. Further scaling of the average log likelihoods by the
logarithm of the duration slightly improves the calibration, and this
improvement is retained when tested on independent test data.
|
TwiSE at SemEval-2016 Task 4: Twitter Sentiment Classification | This paper describes the participation of the team "TwiSE" in the SemEval
2016 challenge. Specifically, we participated in Task 4, namely "Sentiment
Analysis in Twitter" for which we implemented sentiment classification systems
for subtasks A, B, C and D. Our approach consists of two steps. In the first
step, we generate and validate diverse feature sets for twitter sentiment
evaluation, inspired by the work of participants of previous editions of such
challenges. In the second step, we focus on the optimization of the evaluation
measures of the different subtasks. To this end, we examine different learning
strategies by validating them on the data provided by the task organisers. For
our final submissions we used an ensemble learning approach (stacked
generalization) for Subtask A and single linear models for the rest of the
subtasks. In the official leaderboard we were ranked 9/35, 8/19, 1/11 and 2/14
for subtasks A, B, C and D respectively.\footnote{We make the code available
for research purposes at
\url{https://github.com/balikasg/SemEval2016-Twitter\_Sentiment\_Evaluation}.}
|
Deep Learning with Darwin: Evolutionary Synthesis of Deep Neural
Networks | Taking inspiration from biological evolution, we explore the idea of "Can
deep neural networks evolve naturally over successive generations into highly
efficient deep neural networks?" by introducing the notion of synthesizing new
highly efficient, yet powerful deep neural networks over successive generations
via an evolutionary process from ancestor deep neural networks. The
architectural traits of ancestor deep neural networks are encoded using
synaptic probability models, which can be viewed as the `DNA' of these
networks. New descendant networks with differing network architectures are
synthesized based on these synaptic probability models from the ancestor
networks and computational environmental factor models, in a random manner to
mimic heredity, natural selection, and random mutation. These offspring
networks are then trained into fully functional networks, like one would train
a newborn, and have more efficient, more diverse network architectures than
their ancestor networks, while achieving powerful modeling capabilities.
Experimental results for the task of visual saliency demonstrated that the
synthesized `evolved' offspring networks can achieve state-of-the-art
performance while having network architectures that are significantly more
efficient (with a staggering $\sim$48-fold decrease in synapses by the fourth
generation) compared to the original ancestor network.
|
The Parallel Knowledge Gradient Method for Batch Bayesian Optimization | In many applications of black-box optimization, one can evaluate multiple
points simultaneously, e.g. when evaluating the performances of several
different neural network architectures in a parallel computing environment. In
this paper, we develop a novel batch Bayesian optimization algorithm --- the
parallel knowledge gradient method. By construction, this method provides the
one-step Bayes-optimal batch of points to sample. We provide an efficient
strategy for computing this Bayes-optimal batch of points, and we demonstrate
that the parallel knowledge gradient method finds global optima significantly
faster than previous batch Bayesian optimization algorithms on both synthetic
test functions and when tuning hyperparameters of practical machine learning
algorithms, especially when function evaluations are noisy.
|
Logic Tensor Networks: Deep Learning and Logical Reasoning from Data and
Knowledge | We propose Logic Tensor Networks: a uniform framework for integrating
automatic learning and reasoning. A logic formalism called Real Logic is
defined on a first-order language whereby formulas have truth-value in the
interval [0,1] and semantics defined concretely on the domain of real numbers.
Logical constants are interpreted as feature vectors of real numbers. Real
Logic promotes a well-founded integration of deductive reasoning on a
knowledge-base and efficient data-driven relational machine learning. We show
how Real Logic can be implemented in deep Tensor Neural Networks with the use
of Google's tensorflow primitives. The paper concludes with experiments
applying Logic Tensor Networks on a simple but representative example of
knowledge completion.
|
Adversarial Perturbations Against Deep Neural Networks for Malware
Classification | Deep neural networks, like many other machine learning models, have recently
been shown to lack robustness against adversarially crafted inputs. These
inputs are derived from regular inputs by minor yet carefully selected
perturbations that deceive machine learning models into desired
misclassifications. Existing work in this emerging field was largely specific
to the domain of image classification, since the high-entropy of images can be
conveniently manipulated without changing the images' overall visual
appearance. Yet, it remains unclear how such attacks translate to more
security-sensitive applications such as malware detection - which may pose
significant challenges in sample generation and arguably grave consequences for
failure.
In this paper, we show how to construct highly-effective adversarial sample
crafting attacks for neural networks used as malware classifiers. The
application domain of malware classification introduces additional constraints
in the adversarial sample crafting problem when compared to the computer vision
domain: (i) continuous, differentiable input domains are replaced by discrete,
often binary inputs; and (ii) the loose condition of leaving visual appearance
unchanged is replaced by requiring equivalent functional behavior. We
demonstrate the feasibility of these attacks on many different instances of
malware classifiers that we trained using the DREBIN Android malware data set.
We furthermore evaluate to which extent potential defensive mechanisms against
adversarial crafting can be leveraged to the setting of malware classification.
While feature reduction did not prove to have a positive impact, distillation
and re-training on adversarially crafted samples show promising results.
|
DeepMath - Deep Sequence Models for Premise Selection | We study the effectiveness of neural sequence models for premise selection in
automated theorem proving, one of the main bottlenecks in the formalization of
mathematics. We propose a two stage approach for this task that yields good
results for the premise selection task on the Mizar corpus while avoiding the
hand-engineered features of existing state-of-the-art models. To our knowledge,
this is the first time deep learning has been applied to theorem proving on a
large scale.
|
A scalable end-to-end Gaussian process adapter for irregularly sampled
time series classification | We present a general framework for classification of sparse and
irregularly-sampled time series. The properties of such time series can result
in substantial uncertainty about the values of the underlying temporal
processes, while making the data difficult to deal with using standard
classification methods that assume fixed-dimensional feature spaces. To address
these challenges, we propose an uncertainty-aware classification framework
based on a special computational layer we refer to as the Gaussian process
adapter that can connect irregularly sampled time series data to any black-box
classifier learnable using gradient descent. We show how to scale up the
required computations based on combining the structured kernel interpolation
framework and the Lanczos approximation method, and how to discriminatively
train the Gaussian process adapter in combination with a number of classifiers
end-to-end using backpropagation.
|
Recurrent neural network training with preconditioned stochastic
gradient descent | This paper studies the performance of a recently proposed preconditioned
stochastic gradient descent (PSGD) algorithm on recurrent neural network (RNN)
training. PSGD adaptively estimates a preconditioner to accelerate gradient
descent, and is designed to be simple, general and easy to use, as stochastic
gradient descent (SGD). RNNs, especially the ones requiring extremely long term
memories, are difficult to train. We have tested PSGD on a set of synthetic
pathological RNN learning problems and the real world MNIST handwritten digit
recognition task. Experimental results suggest that PSGD is able to achieve
highly competitive performance without using any trick like preprocessing,
pretraining or parameter tweaking.
|
Model-Free Episodic Control | State of the art deep reinforcement learning algorithms take many millions of
interactions to attain human-level performance. Humans, on the other hand, can
very quickly exploit highly rewarding nuances of an environment upon first
discovery. In the brain, such rapid learning is thought to depend on the
hippocampus and its capacity for episodic memory. Here we investigate whether a
simple model of hippocampal episodic control can learn to solve difficult
sequential decision-making tasks. We demonstrate that it not only attains a
highly rewarding strategy significantly faster than state-of-the-art deep
reinforcement learning algorithms, but also achieves a higher overall reward on
some of the more challenging domains.
|
Learning to learn by gradient descent by gradient descent | The move from hand-designed features to learned features in machine learning
has been wildly successful. In spite of this, optimization algorithms are still
designed by hand. In this paper we show how the design of an optimization
algorithm can be cast as a learning problem, allowing the algorithm to learn to
exploit structure in the problems of interest in an automatic way. Our learned
algorithms, implemented by LSTMs, outperform generic, hand-designed competitors
on the tasks for which they are trained, and also generalize well to new tasks
with similar structure. We demonstrate this on a number of tasks, including
simple convex problems, training neural networks, and styling images with
neural art.
|
Omnivore: An Optimizer for Multi-device Deep Learning on CPUs and GPUs | We study the factors affecting training time in multi-device deep learning
systems. Given a specification of a convolutional neural network, our goal is
to minimize the time to train this model on a cluster of commodity CPUs and
GPUs. We first focus on the single-node setting and show that by using standard
batching and data-parallel techniques, throughput can be improved by at least
5.5x over state-of-the-art systems on CPUs. This ensures an end-to-end training
speed directly proportional to the throughput of a device regardless of its
underlying hardware, allowing each node in the cluster to be treated as a black
box. Our second contribution is a theoretical and empirical study of the
tradeoffs affecting end-to-end training time in a multiple-device setting. We
identify the degree of asynchronous parallelization as a key factor affecting
both hardware and statistical efficiency. We see that asynchrony can be viewed
as introducing a momentum term. Our results imply that tuning momentum is
critical in asynchronous parallel configurations, and suggest that published
results that have not been fully tuned might report suboptimal performance for
some configurations. For our third contribution, we use our novel understanding
of the interaction between system and optimization dynamics to provide an
efficient hyperparameter optimizer. Our optimizer involves a predictive model
for the total time to convergence and selects an allocation of resources to
minimize that time. We demonstrate that the most popular distributed deep
learning systems fall within our tradeoff space, but do not optimize within the
space. By doing this optimization, our prototype runs 1.9x to 12x faster than
the fastest state-of-the-art systems.
|
Max-Margin Feature Selection | Many machine learning applications such as in vision, biology and social
networking deal with data in high dimensions. Feature selection is typically
employed to select a subset of features which im- proves generalization
accuracy as well as reduces the computational cost of learning the model. One
of the criteria used for feature selection is to jointly minimize the
redundancy and maximize the rele- vance of the selected features. In this
paper, we formulate the task of feature selection as a one class SVM problem in
a space where features correspond to the data points and instances correspond
to the dimensions. The goal is to look for a representative subset of the
features (support vectors) which describes the boundary for the region where
the set of the features (data points) exists. This leads to a joint
optimization of relevance and redundancy in a principled max-margin framework.
Additionally, our formulation enables us to leverage existing techniques for
optimizing the SVM objective resulting in highly computationally efficient
solutions for the task of feature selection. Specifically, we employ the dual
coordinate descent algorithm (Hsieh et al., 2008), originally proposed for
SVMs, for our formulation. We use a sparse representation to deal with data in
very high dimensions. Experiments on seven publicly available benchmark
datasets from a variety of domains show that our approach results in orders of
magnitude faster solutions even while retaining the same level of accuracy
compared to the state of the art feature selection techniques.
|
Sparsely Connected and Disjointly Trained Deep Neural Networks for Low
Resource Behavioral Annotation: Acoustic Classification in Couples' Therapy | Observational studies are based on accurate assessment of human state. A
behavior recognition system that models interlocutors' state in real-time can
significantly aid the mental health domain. However, behavior recognition from
speech remains a challenging task since it is difficult to find generalizable
and representative features because of noisy and high-dimensional data,
especially when data is limited and annotated coarsely and subjectively. Deep
Neural Networks (DNN) have shown promise in a wide range of machine learning
tasks, but for Behavioral Signal Processing (BSP) tasks their application has
been constrained due to limited quantity of data. We propose a
Sparsely-Connected and Disjointly-Trained DNN (SD-DNN) framework to deal with
limited data. First, we break the acoustic feature set into subsets and train
multiple distinct classifiers. Then, the hidden layers of these classifiers
become parts of a deeper network that integrates all feature streams. The
overall system allows for full connectivity while limiting the number of
parameters trained at any time and allows convergence possible with even
limited data. We present results on multiple behavior codes in the couples'
therapy domain and demonstrate the benefits in behavior classification
accuracy. We also show the viability of this system towards live behavior
annotations.
|
Training variance and performance evaluation of neural networks in
speech | In this work we study variance in the results of neural network training on a
wide variety of configurations in automatic speech recognition. Although this
variance itself is well known, this is, to the best of our knowledge, the first
paper that performs an extensive empirical study on its effects in speech
recognition. We view training as sampling from a distribution and show that
these distributions can have a substantial variance. These results show the
urgent need to rethink the way in which results in the literature are reported
and interpreted.
|
A New Approach to Dimensionality Reduction for Anomaly Detection in Data
Traffic | The monitoring and management of high-volume feature-rich traffic in large
networks offers significant challenges in storage, transmission and
computational costs. The predominant approach to reducing these costs is based
on performing a linear mapping of the data to a low-dimensional subspace such
that a certain large percentage of the variance in the data is preserved in the
low-dimensional representation. This variance-based subspace approach to
dimensionality reduction forces a fixed choice of the number of dimensions, is
not responsive to real-time shifts in observed traffic patterns, and is
vulnerable to normal traffic spoofing. Based on theoretical insights proved in
this paper, we propose a new distance-based approach to dimensionality
reduction motivated by the fact that the real-time structural differences
between the covariance matrices of the observed and the normal traffic is more
relevant to anomaly detection than the structure of the training data alone.
Our approach, called the distance-based subspace method, allows a different
number of reduced dimensions in different time windows and arrives at only the
number of dimensions necessary for effective anomaly detection. We present
centralized and distributed versions of our algorithm and, using simulation on
real traffic traces, demonstrate the qualitative and quantitative advantages of
the distance-based subspace approach.
|
A two-stage learning method for protein-protein interaction prediction | In this paper, a new method for PPI (proteinprotein interaction) prediction
is proposed. In PPI prediction, a reliable and sufficient number of training
samples is not available, but a large number of unlabeled samples is in hand.
In the proposed method, the denoising auto encoders are employed for learning
robust features. The obtained robust features are used in order to train a
classifier with a better performance. The experimental results demonstrate the
capabilities of the proposed method.
Protein-protein interaction; Denoising auto encoder;Robust features;
Unlabelled data;
|
Deep Reinforcement Learning With Macro-Actions | Deep reinforcement learning has been shown to be a powerful framework for
learning policies from complex high-dimensional sensory inputs to actions in
complex tasks, such as the Atari domain. In this paper, we explore output
representation modeling in the form of temporal abstraction to improve
convergence and reliability of deep reinforcement learning approaches. We
concentrate on macro-actions, and evaluate these on different Atari 2600 games,
where we show that they yield significant improvements in learning speed.
Additionally, we show that they can even achieve better scores than DQN. We
offer analysis and explanation for both convergence and final results,
revealing a problem deep RL approaches have with sparse reward signals.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.